access control patching data encryption configuration enforcement decommissioning hardening techniques